Tips
Tips
Network security management
-
OpenVAS how-to: Creating a vulnerability assessment report
In this OpenVAS how-to, learn how to use the free scanner to create a vulnerability assessment report and assess threat levels. Continue Reading
-
Best practices for audit, log review for IT security investigations
Device logs can be one of the most helpful tools infosec pros have, or they can be a huge waste of space. Continue Reading
-
Best practices for (small) botnets
Your enterprise might have a strategy to deal with a large-scale botnet attack, but how would you deal with a micro-botnet that knows how to bypass antivirus and firewalls? Get botnet help with this expert advice. Continue Reading
-
How to use a netstat command in Windows to watch open ports
Mike Cobb shows how a simple command line tool can provide invaluable information about what's happening on your system Continue Reading
-
USB storage devices: Two ways to stop the threat to network security
USB storage devices pose a significant threat to network security. This tip discusses some basic strategies for blocking unauthorized USB device use. Continue Reading
-
Bringing the network perimeter back from the 'dead'
Many have expressed the importance of endpoint security, going so far as to say the perimeter is dead. Not so fast, says network security expert Mike Chapple. Continue Reading
-
Network analysis -- Enhancing security assessments
Network security assessment doesn't have to rely on expensive automated tools. In this tip, learn how to use data from freely available tools to produce a comprehensive view of network security. Continue Reading
-
Wireless security -- Defending Wi-Fi clients
In this tip, Lisa Phifer examines how host-resident wireless IPS agents can help you safeguard Wi-Fi client devices to ensure strong wireless security. Continue Reading
-
Intrusion detection systems -- introduction to IDS and IPCop
This article, excerpted from the book ""Configuring IPCop Firewalls: Closing Borders with Open Source,"" explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from ... Continue Reading
-
BackTrack: The gotta-have, free, network security tool you've never heard of
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. Continue Reading